Abstract
Background: The Cloud model is one of the most realistic frameworks with a vast range of social networking interactions. In medical data, security is a major constraint as it incorporates information about the patients. The cloud environment subjected to mobility and openness is exposed to security issues and limits authorization levels for data transmission.
Objective: This patent paper aims to propose a security model for attack prevention within the healthcare environment.
Method: The proposed Cryptographic Attribute-based Machine Learning (CAML) scheme incorporates three stages. Initially, the homomorphic encryption escrow is performed for secure data transmission in the cloud. Secondly, the information of the users is evaluated based on the consideration of users' authorization. The authorization process for the users is carried out with the attribute- based ECC technique. Finally, the ML model with the classifier is applied for the detection and classification of attacks in the medical network.
Results: The detected attack is computed and processed with the CNN model. Simulation analysis is performed for the proposed CAML with conventional ANN, CNN, and RNN models. The simulation analysis of proposed CAML achieves a higher accuracy of 0.96 while conventional SVM, RF, and DT achieve an accuracy of 0.82, 0.89 and 0.93, respectively.
Conclusion: With the analysis, it is concluded that the proposed CAML model achieves higher classification accuracy for attack detection and prevention in the cloud computing environment.
Keywords: Security, healthcare, classifier, cryptography, attack, homomorphic.
[http://dx.doi.org/10.3390/electronics8070768]
[http://dx.doi.org/10.34306/itsdi.v1i2.103]
[http://dx.doi.org/10.1109/COMST.2020.2989392]
[http://dx.doi.org/10.48161/qaj.v1n2a36]
[http://dx.doi.org/10.1016/j.ijinfomgt.2019.05.017]
[http://dx.doi.org/10.1007/s12652-017-0659-1]
[http://dx.doi.org/10.1186/s12911-020-01153-7] [PMID: 31906929]
[http://dx.doi.org/10.1109/ACCESS.2021.3049564]
[http://dx.doi.org/10.3390/sym13050742]
[http://dx.doi.org/10.1016/j.eij.2020.07.003]
[http://dx.doi.org/10.1155/2021/6615411] [PMID: 33790958]
[http://dx.doi.org/10.1007/978-981-16-0167-5_6]
[http://dx.doi.org/10.31559/glm2021.10.2.6]
[http://dx.doi.org/10.3390/s22020528] [PMID: 35062491]
[http://dx.doi.org/10.1016/j.sysarc.2021.102108]
[http://dx.doi.org/10.36548/jtcsst.2021.4.006]
[http://dx.doi.org/10.1109/ICIEM51511.2021.9445377]
[http://dx.doi.org/10.1007/s11128-022-03452-6]
[http://dx.doi.org/10.1109/ICACITE51222.2021.9404568]
[http://dx.doi.org/10.1016/j.gltp.2021.01.013]
[http://dx.doi.org/10.1007/978-981-16-8484-5_46]
[http://dx.doi.org/10.1016/j.matpr.2020.08.519]
[http://dx.doi.org/10.1109/ICAIS50930.2021.9395890]
[http://dx.doi.org/10.52711/2321-581X.2021.00019]
[http://dx.doi.org/10.3390/s22031109] [PMID: 35161853]
[http://dx.doi.org/10.1007/s10586-020-03157-4]